Performance Evaluation of Smart Security System Prototype Based on Radio Frequency Identification (RFID) and Internet of Things (IoT)

Author(s):  
Doan Perdana ◽  
Muhamad Ihsan ◽  
Rendy Munadi ◽  
Sussi Sussi ◽  
Nurwulan Nurwulan
2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


This paper discourses about a very general problem that occurs in everyday life. In many universities, students are at risk of misplacement or theft of valuables. So, to avoid such mis happening, the development of security system was designed for providing the safety of university student belongings. The proposed security system contains some common information, methodology, schematics and some details related to technical field that is employed into the system, such as RFID (Radio Frequency Identification) and barcode readers along with the design of the established system. For the functioning of the system in a most effectively manner, assumptions with some specific requirements that is needed to be met are encompassed in this paper


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 987
Author(s):  
Luciano Tarricone ◽  
Jasmin Grosinger

Radio frequency identification (RFID) is one of the crucial enabling technologies for the Internet of Things (IoT). This is leading to a continuous augmentation of RFID technologies, in terms of sensing capabilities, energetic autonomy, usability, and cost affordability, and this special issue proposes an overview on such a challenging scenario. The proposed results, in terms of cost reduction, miniaturization, and compatibility with complex systems and technologies, as well as the identification of the relevant criticalities, also pave the way to future steps being taken that go beyond the current IoT.


2013 ◽  
Vol 756-759 ◽  
pp. 4529-4532 ◽  
Author(s):  
Hao Zeng ◽  
Yan Hui Fu ◽  
Xu Chen

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.


Sign in / Sign up

Export Citation Format

Share Document